task
stringlengths
12
101
input
stringlengths
5
5.87k
output
stringlengths
1
5.47k
options
sequence
pageTitle
stringlengths
0
151
outputColName
stringlengths
1
142
url
stringlengths
24
147
wdcFile
stringlengths
71
75
203127cf_WG__Security_Model____W3C_Wiki__Description
[Requirement] Valid across multiple platforms [Source] Compatibility of application packages [Description]
Applications can run on any conformant platform, potentially including any device form factor
[]
Difference between revisions of "System Applications WG: Security Model" - W3C Wiki
Description
http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62610&oldid=62609
44/1438042990445.44_20150728002310-00185-ip-10-236-191-2_823603389_1.json
203127cf_WG__Security_Model____W3C_Wiki__Description
[Requirement] Access control log [Source] webinos [Description]
Allow access control decisions to be logged.
[]
Difference between revisions of "System Applications WG: Security Model" - W3C Wiki
Description
http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62610&oldid=62609
44/1438042990445.44_20150728002310-00185-ip-10-236-191-2_823603389_1.json
203127cf_WG__Security_Model____W3C_Wiki__Description
[Requirement] API access rationale [Source] webinos [Description]
Applications shall be able to explain why access to data or APIs is being requested.
[]
Difference between revisions of "System Applications WG: Security Model" - W3C Wiki
Description
http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62610&oldid=62609
44/1438042990445.44_20150728002310-00185-ip-10-236-191-2_823603389_1.json
203127cf_WG__Security_Model____W3C_Wiki__Description
[Requirement] Application capability restriction [Source] webinos [Description]
Applications shall access only its specified device features, extensions and content.
[]
Difference between revisions of "System Applications WG: Security Model" - W3C Wiki
Description
http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62610&oldid=62609
44/1438042990445.44_20150728002310-00185-ip-10-236-191-2_823603389_1.json
203127cf_WG__Security_Model____W3C_Wiki__Description
[Requirement] Application intent [Source] webinos [Description]
Applications shall specify its required functionality at install time or during updates.
[]
Difference between revisions of "System Applications WG: Security Model" - W3C Wiki
Description
http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62610&oldid=62609
44/1438042990445.44_20150728002310-00185-ip-10-236-191-2_823603389_1.json
203127cf_WG__Security_Model____W3C_Wiki__Description
[Requirement] Application isolation [Source] webinos [Description]
Applications shall be isolated from each other.
[]
Difference between revisions of "System Applications WG: Security Model" - W3C Wiki
Description
http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62610&oldid=62609
44/1438042990445.44_20150728002310-00185-ip-10-236-191-2_823603389_1.json
203127cf_WG__Security_Model____W3C_Wiki__Description
[Requirement] Application policy approval [Source] webinos [Description]
Changes to existing application intentions and permissions shall be approved by the end user.
[]
Difference between revisions of "System Applications WG: Security Model" - W3C Wiki
Description
http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62610&oldid=62609
44/1438042990445.44_20150728002310-00185-ip-10-236-191-2_823603389_1.json
203127cf_WG__Security_Model____W3C_Wiki__Description
[Requirement] Authenticity check [Source] webinos [Description]
Before being installed or updated, origin authenticity and integrity checks shall be performed by the runtime
[]
Difference between revisions of "System Applications WG: Security Model" - W3C Wiki
Description
http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62610&oldid=62609
44/1438042990445.44_20150728002310-00185-ip-10-236-191-2_823603389_1.json
203127cf_WG__Security_Model____W3C_Wiki__Description
[Requirement] Certifier list [Source] webinos [Description]
The list of authorities that certified an application shall be viewable by end-users.
[]
Difference between revisions of "System Applications WG: Security Model" - W3C Wiki
Description
http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62610&oldid=62609
44/1438042990445.44_20150728002310-00185-ip-10-236-191-2_823603389_1.json
203127cf_WG__Security_Model____W3C_Wiki__Description
[Requirement] Confidential credentials storage [Source] webinos [Description]
The webinos runtime shall support the confidential storage of user credentials.
[]
Difference between revisions of "System Applications WG: Security Model" - W3C Wiki
Description
http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62610&oldid=62609
44/1438042990445.44_20150728002310-00185-ip-10-236-191-2_823603389_1.json
203127cf_WG__Security_Model____W3C_Wiki__Description
[Requirement] Credentials access restriction [Source] webinos [Description]
Access to credentials storage shall be limited to a specific user, a specific device and a set of applications.
[]
Difference between revisions of "System Applications WG: Security Model" - W3C Wiki
Description
http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62610&oldid=62609
44/1438042990445.44_20150728002310-00185-ip-10-236-191-2_823603389_1.json
203127cf_WG__Security_Model____W3C_Wiki__Description
[Requirement] Data management rationale [Source] webinos [Description]
applications shall be able to explain how collected sensitive data will be managed.
[]
Difference between revisions of "System Applications WG: Security Model" - W3C Wiki
Description
http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62610&oldid=62609
44/1438042990445.44_20150728002310-00185-ip-10-236-191-2_823603389_1.json
203127cf_WG__Security_Model____W3C_Wiki__Description
[Requirement] Default policy [Source] webinos [Description]
A default security and privacy policy shall exist an be enforced on each conformant runtime
[]
Difference between revisions of "System Applications WG: Security Model" - W3C Wiki
Description
http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62610&oldid=62609
44/1438042990445.44_20150728002310-00185-ip-10-236-191-2_823603389_1.json
203127cf_WG__Security_Model____W3C_Wiki__Description
[Requirement] Device-identity binding [Source] webinos [Description]
Personal devices shall be bound to their owner's identities.
[]
Difference between revisions of "System Applications WG: Security Model" - W3C Wiki
Description
http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62610&oldid=62609
44/1438042990445.44_20150728002310-00185-ip-10-236-191-2_823603389_1.json
203127cf_WG__Security_Model____W3C_Wiki__Description
[Requirement] Device-identity binding revokation [Source] webinos [Description]
The binding between personal devices and owner's identity shall be revokable.
[]
Difference between revisions of "System Applications WG: Security Model" - W3C Wiki
Description
http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62610&oldid=62609
44/1438042990445.44_20150728002310-00185-ip-10-236-191-2_823603389_1.json
203127cf_WG__Security_Model____W3C_Wiki__Description
[Requirement] Hierarchical policy enforcement [Source] webinos [Description]
Runtimes can enforce multiple access control rules written by multiple stakeholders in a hierarchy.
[]
Difference between revisions of "System Applications WG: Security Model" - W3C Wiki
Description
http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62610&oldid=62609
44/1438042990445.44_20150728002310-00185-ip-10-236-191-2_823603389_1.json
203127cf_WG__Security_Model____W3C_Wiki__Description
[Requirement] Secure cache [Source] webinos [Description]
Data cached by a runtime shall be securely stored to prevent disclosure and tampering by unauthorised entitites.
[]
Difference between revisions of "System Applications WG: Security Model" - W3C Wiki
Description
http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62610&oldid=62609
44/1438042990445.44_20150728002310-00185-ip-10-236-191-2_823603389_1.json
203127cf_WG__Security_Model____W3C_Wiki__Description
[Requirement] Secure storage [Source] webinos [Description]
Application data shall be securely stored to prevent disclosure and tampering by unauthorised entities.
[]
Difference between revisions of "System Applications WG: Security Model" - W3C Wiki
Description
http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62610&oldid=62609
44/1438042990445.44_20150728002310-00185-ip-10-236-191-2_823603389_1.json
203127cf_WG__Security_Model____W3C_Wiki__Description
[Requirement] Trusted application source [Source] webinos [Implications] Apps must have provenance data attached to them [Description]
When installing or using an application for the first time, the runtime shall establish that the user trusts the source of the application.
[]
Difference between revisions of "System Applications WG: Security Model" - W3C Wiki
Description
http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62610&oldid=62609
44/1438042990445.44_20150728002310-00185-ip-10-236-191-2_823603389_1.json
203127cf_WG__Security_Model____W3C_Wiki__Description
[Requirement] App stores can revoke applications [Source] B2G - https://wiki.mozilla.org/B2G_App_Security_Model [Implications] App permissions can be changed remotely [Description]
"An app store needs to be able to approve an application, implying they can verify the permissions, integrity and authenticity of the app"
[]
Difference between revisions of "System Applications WG: Security Model" - W3C Wiki
Description
http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62610&oldid=62609
44/1438042990445.44_20150728002310-00185-ip-10-236-191-2_823603389_1.json
203127cf_WG__Security_Model____W3C_Wiki__Description
[Requirement] External trusted party can set app default permissions [Source] Extrapolated from B2G - https://wiki.mozilla.org/B2G_App_Security_Model [Implications] The user is not the only source of access control decisions. this also suggests a need for conflict resolution. [Description]
B2G: "App store must be able to set the default permissions for an app".
[]
Difference between revisions of "System Applications WG: Security Model" - W3C Wiki
Description
http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62610&oldid=62609
44/1438042990445.44_20150728002310-00185-ip-10-236-191-2_823603389_1.json
203127cf_WG__Security_Model____W3C_Wiki__Description
[Requirement] Installation [Source] B2G, webinos [Description]
Applications must be installed before executed
[]
Difference between revisions of "System Applications WG: Security Model" - W3C Wiki
Description
http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62610&oldid=62609
44/1438042990445.44_20150728002310-00185-ip-10-236-191-2_823603389_1.json
203127cf_WG__Security_Model____W3C_Wiki__Description
[Requirement] Owner override [Source] B2G (user), webinos (user) [Implications] Access control settings must be changeable [Description]
The device owner must be able to override app settings and permissions (this may not be the user, but a corporate, for example)
[]
Difference between revisions of "System Applications WG: Security Model" - W3C Wiki
Description
http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62610&oldid=62609
44/1438042990445.44_20150728002310-00185-ip-10-236-191-2_823603389_1.json
203127cf_WG__Security_Model____W3C_Wiki__Description
[Requirement] App privilege visibility [Source] B2G - https://wiki.mozilla.org/B2G_App_Security_Model [Implications] There must be a standard way for applications to identify the permissions they have and lack [Description]
Apps should be able to discover their privileges and degrade gracefully in a limited privilege environment
[]
Difference between revisions of "System Applications WG: Security Model" - W3C Wiki
Description
http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62610&oldid=62609
44/1438042990445.44_20150728002310-00185-ip-10-236-191-2_823603389_1.json
203127cf_WG__Security_Model____W3C_Wiki__Description
[Requirement] Permission usability [Source] B2G - https://wiki.mozilla.org/B2G_App_Security_Model [Description]
Apps should be able to discover their privileges and degrade gracefully in a limited privilege environment
[]
Difference between revisions of "System Applications WG: Security Model" - W3C Wiki
Description
http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62610&oldid=62609
44/1438042990445.44_20150728002310-00185-ip-10-236-191-2_823603389_1.json
203127cf_WG__Security_Model____W3C_Wiki__Description
[Requirement] Immunity to browser-based threats [Source] B2G - https://wiki.mozilla.org/B2G_App_Security_Model [Implications] Non-browser security context: may be additional restrictions on HTML/JavaScript [Description]
Apps should not be vulnerable to common web vulnerabilities when granted significant privileges
[]
Difference between revisions of "System Applications WG: Security Model" - W3C Wiki
Description
http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62610&oldid=62609
44/1438042990445.44_20150728002310-00185-ip-10-236-191-2_823603389_1.json
203127cf_WG__Security_Model____W3C_Wiki__Description
[Requirement] Pre-installed app permissions [Source] B2G - https://wiki.mozilla.org/B2G_App_Security_Model [Implications] Different 'levels' apply to SysApps - possibly 'roles' [Description]
Ability to grant trust for certain highly sensitive privileges (such as phone dialing) may be restricted at the OS level to specific trusted parties
[]
Difference between revisions of "System Applications WG: Security Model" - W3C Wiki
Description
http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62610&oldid=62609
44/1438042990445.44_20150728002310-00185-ip-10-236-191-2_823603389_1.json
203127cf_WG__Security_Model____W3C_Wiki__Description
[Requirement] Access to files outside owned by the platform [Source] Mailing list: http://lists.w3.org/Archives/Public/public-sysapps/2012Nov/0003.html [Implications] Need to provide both sandboxed and non-sandboxed storage [Description]
Ability for a system application to access (read and write) files outside of that application's sandboxed storage area.
[]
Difference between revisions of "System Applications WG: Security Model" - W3C Wiki
Description
http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62610&oldid=62609
44/1438042990445.44_20150728002310-00185-ip-10-236-191-2_823603389_1.json
16eb7f48_WG__Security_Model____W3C_Wiki__Implications
[Requirement] Supports many device form factors [Description] Supports a wide variety of devices including desktop & laptop computers, smart phones, tablets, TVs, cameras, and other connected devices [Source] SysApps Charter [Implications]
The security model can make no assumptions about how the device will be used or shared between people and cannot assume a particular process model.
[]
Difference between revisions of "System Applications WG: Security Model" - W3C Wiki
Implications
http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62610&oldid=62609
44/1438042990445.44_20150728002310-00185-ip-10-236-191-2_823603389_1.json
16eb7f48_WG__Security_Model____W3C_Wiki__Implications
[Requirement] DAP API Support [Description] All APIs defined by DAP should be accessible to system applications [Source] SysApps Charter [Implications]
Either DAP APIs will need to change slightly in the systems context or the security model must allow for API-specific access controls
[]
Difference between revisions of "System Applications WG: Security Model" - W3C Wiki
Implications
http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62610&oldid=62609
44/1438042990445.44_20150728002310-00185-ip-10-236-191-2_823603389_1.json
16eb7f48_WG__Security_Model____W3C_Wiki__Implications
[Requirement] Minimal user prompting [Description] Problems such as 'double prompting' should be avoided when integrating other APIs [Source] SysApps Charter [Implications]
Some details of the expected user interactions may need to be specified in the security model or APIs
[]
Difference between revisions of "System Applications WG: Security Model" - W3C Wiki
Implications
http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62610&oldid=62609
44/1438042990445.44_20150728002310-00185-ip-10-236-191-2_823603389_1.json
16eb7f48_WG__Security_Model____W3C_Wiki__Implications
[Requirement] Communicate with other applications [Description] Applications can communicate with other applications [Implications]
Some kind of messaging will be supported
[]
Difference between revisions of "System Applications WG: Security Model" - W3C Wiki
Implications
http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62610&oldid=62609
44/1438042990445.44_20150728002310-00185-ip-10-236-191-2_823603389_1.json
16eb7f48_WG__Security_Model____W3C_Wiki__Implications
[Requirement] Communicate with pre-defined endpoints [Description] Applications can communicate with pre-defined web addresses [Implications]
Access remote domains will be possible
[]
Difference between revisions of "System Applications WG: Security Model" - W3C Wiki
Implications
http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62610&oldid=62609
44/1438042990445.44_20150728002310-00185-ip-10-236-191-2_823603389_1.json
16eb7f48_WG__Security_Model____W3C_Wiki__Implications
[Requirement] Trusted application source [Description] When installing or using an application for the first time, the runtime shall establish that the user trusts the source of the application. [Source] webinos [Implications]
Apps must have provenance data attached to them
[]
Difference between revisions of "System Applications WG: Security Model" - W3C Wiki
Implications
http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62610&oldid=62609
44/1438042990445.44_20150728002310-00185-ip-10-236-191-2_823603389_1.json
16eb7f48_WG__Security_Model____W3C_Wiki__Implications
[Requirement] App stores can revoke applications [Description] "An app store needs to be able to approve an application, implying they can verify the permissions, integrity and authenticity of the app" [Source] B2G - https://wiki.mozilla.org/B2G_App_Security_Model [Implications]
App permissions can be changed remotely
[]
Difference between revisions of "System Applications WG: Security Model" - W3C Wiki
Implications
http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62610&oldid=62609
44/1438042990445.44_20150728002310-00185-ip-10-236-191-2_823603389_1.json
16eb7f48_WG__Security_Model____W3C_Wiki__Implications
[Requirement] External trusted party can set app default permissions [Description] B2G: "App store must be able to set the default permissions for an app". [Source] Extrapolated from B2G - https://wiki.mozilla.org/B2G_App_Security_Model [Implications]
The user is not the only source of access control decisions. this also suggests a need for conflict resolution.
[]
Difference between revisions of "System Applications WG: Security Model" - W3C Wiki
Implications
http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62610&oldid=62609
44/1438042990445.44_20150728002310-00185-ip-10-236-191-2_823603389_1.json
16eb7f48_WG__Security_Model____W3C_Wiki__Implications
[Requirement] Owner override [Description] The device owner must be able to override app settings and permissions (this may not be the user, but a corporate, for example) [Source] B2G (user), webinos (user) [Implications]
Access control settings must be changeable
[]
Difference between revisions of "System Applications WG: Security Model" - W3C Wiki
Implications
http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62610&oldid=62609
44/1438042990445.44_20150728002310-00185-ip-10-236-191-2_823603389_1.json
16eb7f48_WG__Security_Model____W3C_Wiki__Implications
[Requirement] App privilege visibility [Description] Apps should be able to discover their privileges and degrade gracefully in a limited privilege environment [Source] B2G - https://wiki.mozilla.org/B2G_App_Security_Model [Implications]
There must be a standard way for applications to identify the permissions they have and lack
[]
Difference between revisions of "System Applications WG: Security Model" - W3C Wiki
Implications
http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62610&oldid=62609
44/1438042990445.44_20150728002310-00185-ip-10-236-191-2_823603389_1.json
16eb7f48_WG__Security_Model____W3C_Wiki__Implications
[Requirement] Immunity to browser-based threats [Description] Apps should not be vulnerable to common web vulnerabilities when granted significant privileges [Source] B2G - https://wiki.mozilla.org/B2G_App_Security_Model [Implications]
Non-browser security context: may be additional restrictions on HTML/JavaScript
[]
Difference between revisions of "System Applications WG: Security Model" - W3C Wiki
Implications
http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62610&oldid=62609
44/1438042990445.44_20150728002310-00185-ip-10-236-191-2_823603389_1.json
16eb7f48_WG__Security_Model____W3C_Wiki__Implications
[Requirement] Pre-installed app permissions [Description] Ability to grant trust for certain highly sensitive privileges (such as phone dialing) may be restricted at the OS level to specific trusted parties [Source] B2G - https://wiki.mozilla.org/B2G_App_Security_Model [Implications]
Different 'levels' apply to SysApps - possibly 'roles'
[]
Difference between revisions of "System Applications WG: Security Model" - W3C Wiki
Implications
http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62610&oldid=62609
44/1438042990445.44_20150728002310-00185-ip-10-236-191-2_823603389_1.json
16eb7f48_WG__Security_Model____W3C_Wiki__Implications
[Requirement] Access to files outside owned by the platform [Description] Ability for a system application to access (read and write) files outside of that application's sandboxed storage area. [Source] Mailing list: http://lists.w3.org/Archives/Public/public-sysapps/2012Nov/0003.html [Implications]
Need to provide both sandboxed and non-sandboxed storage
[]
Difference between revisions of "System Applications WG: Security Model" - W3C Wiki
Implications
http://www.w3.org/wiki/index.php?title=System_Applications_WG:_Security_Model&curid=6701&diff=62610&oldid=62609
44/1438042990445.44_20150728002310-00185-ip-10-236-191-2_823603389_1.json
02c2d414_tion_Reference_Markup_Language__Type
[Part] ItemID [Applies] Item [Description] Returns the unique identifier assigned to the item by the simulation when it was created. [Type]
Attribute
[ [ "A", "t", "t", "r", "i", "b", "u", "t", "e" ], [ "C", "o", "l", "l", "e", "c", "t", "i", "o", "n" ] ]
SRML - Simulation Reference Markup Language
Type
http://www.w3.org/TR/2002/NOTE-SRML-20021218/
44/1438042981525.10_20150728002301-00263-ip-10-236-191-2_796042261_2.json
02c2d414_tion_Reference_Markup_Language__Type
[Part] Events [Applies] Item [Description] Returns the events currently scheduled for an item. [Type]
Collection
[ [ "A", "t", "t", "r", "i", "b", "u", "t", "e" ], [ "C", "o", "l", "l", "e", "c", "t", "i", "o", "n" ] ]
SRML - Simulation Reference Markup Language
Type
http://www.w3.org/TR/2002/NOTE-SRML-20021218/
44/1438042981525.10_20150728002301-00263-ip-10-236-191-2_796042261_2.json
02c2d414_tion_Reference_Markup_Language__Type
[Part] ItemClass [Applies] Item [Description] Returns the ItemClass of the item. [Type]
Attribute
[ [ "A", "t", "t", "r", "i", "b", "u", "t", "e" ], [ "C", "o", "l", "l", "e", "c", "t", "i", "o", "n" ] ]
SRML - Simulation Reference Markup Language
Type
http://www.w3.org/TR/2002/NOTE-SRML-20021218/
44/1438042981525.10_20150728002301-00263-ip-10-236-191-2_796042261_2.json
02c2d414_tion_Reference_Markup_Language__Type
[Part] Items [Applies] Item [Description] Refers to the sub items of the current item. [Type]
Collection
[ [ "A", "t", "t", "r", "i", "b", "u", "t", "e" ], [ "C", "o", "l", "l", "e", "c", "t", "i", "o", "n" ] ]
SRML - Simulation Reference Markup Language
Type
http://www.w3.org/TR/2002/NOTE-SRML-20021218/
44/1438042981525.10_20150728002301-00263-ip-10-236-191-2_796042261_2.json
02c2d414_tion_Reference_Markup_Language__Type
[Part] Location [Applies] Item [Description] Refers to another item that represents the current location of the item. [Type]
Attribute
[ [ "A", "t", "t", "r", "i", "b", "u", "t", "e" ], [ "C", "o", "l", "l", "e", "c", "t", "i", "o", "n" ] ]
SRML - Simulation Reference Markup Language
Type
http://www.w3.org/TR/2002/NOTE-SRML-20021218/
44/1438042981525.10_20150728002301-00263-ip-10-236-191-2_796042261_2.json
02c2d414_tion_Reference_Markup_Language__Type
[Part] Node [Applies] Item [Description] Returns the XML DOM node corresponding to the item. [Type]
Attribute
[ [ "A", "t", "t", "r", "i", "b", "u", "t", "e" ], [ "C", "o", "l", "l", "e", "c", "t", "i", "o", "n" ] ]
SRML - Simulation Reference Markup Language
Type
http://www.w3.org/TR/2002/NOTE-SRML-20021218/
44/1438042981525.10_20150728002301-00263-ip-10-236-191-2_796042261_2.json
02c2d414_tion_Reference_Markup_Language__Type
[Part] Self [Applies] Item [Description] Returns a reference to the current item. In JavaScript, the keyword 'this' may also be used. In VBScript, the keyword 'Me' may also be used. [Type]
Attribute
[ [ "A", "t", "t", "r", "i", "b", "u", "t", "e" ], [ "C", "o", "l", "l", "e", "c", "t", "i", "o", "n" ] ]
SRML - Simulation Reference Markup Language
Type
http://www.w3.org/TR/2002/NOTE-SRML-20021218/
44/1438042981525.10_20150728002301-00263-ip-10-236-191-2_796042261_2.json
cf9fe62b_abulary___ODRL_Community_Group_ute__scope__of_the_entity_Role_Semantics
[Identifier] Individual [Comment] Must be supported. [Semantics]
The Party is a single individual
[]
ODRL Version 2.1 Common Vocabulary | ODRL Community Group
Semantics
https://www.w3.org/community/odrl/vocab/2.1/?rev=342
44/1438042988399.65_20150728002308-00060-ip-10-236-191-2_951826955_8.json
cf9fe62b_abulary___ODRL_Community_Group_ute__scope__of_the_entity_Role_Semantics
[Identifier] Group [Comment] Must be supported. [Semantics]
The Party represents a defined group with multiple individual members
[]
ODRL Version 2.1 Common Vocabulary | ODRL Community Group
Semantics
https://www.w3.org/community/odrl/vocab/2.1/?rev=342
44/1438042988399.65_20150728002308-00060-ip-10-236-191-2_951826955_8.json
cf9fe62b_abulary___ODRL_Community_Group_ute__scope__of_the_entity_Role_Semantics
[Identifier] All [Comment] For example, may be used to indicate all the users of a specific social network the party is a member of. Note that “group” scope is also assumed. [Semantics]
All the collective individuals within a context
[]
ODRL Version 2.1 Common Vocabulary | ODRL Community Group
Semantics
https://www.w3.org/community/odrl/vocab/2.1/?rev=342
44/1438042988399.65_20150728002308-00060-ip-10-236-191-2_951826955_8.json
cf9fe62b_abulary___ODRL_Community_Group_ute__scope__of_the_entity_Role_Semantics
[Identifier] AllConnections [Comment] For example, may be used to indicate all “friends” of the Party. Note that “group” scope is also assumed. [Semantics]
All the first-level connections of the Party
[]
ODRL Version 2.1 Common Vocabulary | ODRL Community Group
Semantics
https://www.w3.org/community/odrl/vocab/2.1/?rev=342
44/1438042988399.65_20150728002308-00060-ip-10-236-191-2_951826955_8.json
cf9fe62b_abulary___ODRL_Community_Group_ute__scope__of_the_entity_Role_Semantics
[Identifier] All2ndConnections [Comment] For example, may be used to indicate all “friends of friends” of the Party. Note that “group” scope is also assumed. [Semantics]
All the second-level connections of the Party
[]
ODRL Version 2.1 Common Vocabulary | ODRL Community Group
Semantics
https://www.w3.org/community/odrl/vocab/2.1/?rev=342
44/1438042988399.65_20150728002308-00060-ip-10-236-191-2_951826955_8.json
cf9fe62b_abulary___ODRL_Community_Group_ute__scope__of_the_entity_Role_Semantics
[Identifier] AllGroups [Comment] For example, may be used to indicate all groups that the Party is a member of. Note that “group” scope is also assumed. [Semantics]
All the group connections of the Party
[]
ODRL Version 2.1 Common Vocabulary | ODRL Community Group
Semantics
https://www.w3.org/community/odrl/vocab/2.1/?rev=342
44/1438042988399.65_20150728002308-00060-ip-10-236-191-2_951826955_8.json
f01d46c9_abulary___ODRL_Community_Group_tity_Type_of_the_Policy_Entity_Semantics
[Identifier] Agreement [Comment] Must contain at least the Party entity with Assigner role and a Party with Assignee role. The latter being granted the terms of the Agreement from the former. [Semantics]
Policy expressions that are formal contracts (or licenses) stipulating all the terms of usage and all the parties involved.
[]
ODRL Version 2.1 Common Vocabulary | ODRL Community Group
Semantics
https://www.w3.org/community/odrl/vocab/2.1/?rev=342
44/1438042988399.65_20150728002308-00060-ip-10-236-191-2_951826955_2.json
f01d46c9_abulary___ODRL_Community_Group_tity_Type_of_the_Policy_Entity_Semantics
[Identifier] Offer [Comment] Must contain a Party entity with Assigner role. The Offer may contain a Party entity with Assignee role, but does not grant any privileges to that Party. [Semantics]
Policy expressions that propose terms of usage from an Asset owner
[]
ODRL Version 2.1 Common Vocabulary | ODRL Community Group
Semantics
https://www.w3.org/community/odrl/vocab/2.1/?rev=342
44/1438042988399.65_20150728002308-00060-ip-10-236-191-2_951826955_2.json
f01d46c9_abulary___ODRL_Community_Group_tity_Type_of_the_Policy_Entity_Semantics
[Identifier] Privacy [Comment] Must contain at least the Party entity with Assigner role and a Party with Assignee role. Must also contain a Duty on the assignee related to obligations towards managing the assigner’s Asset containing personal information. The Assignee is being granted the terms of the Privacy policy from the Assigner. [Semantics]
Policy expressions that stipulate the terms of usage over personal information.
[]
ODRL Version 2.1 Common Vocabulary | ODRL Community Group
Semantics
https://www.w3.org/community/odrl/vocab/2.1/?rev=342
44/1438042988399.65_20150728002308-00060-ip-10-236-191-2_951826955_2.json
f01d46c9_abulary___ODRL_Community_Group_tity_Type_of_the_Policy_Entity_Semantics
[Identifier] Request [Comment] Must contain a Party entity with Assignee role. The Request may also contain the Party entity with Assigner role if this is known. No privileges are granted to any Party. [Semantics]
Policy expressions that propose terms of usage to an Asset owner
[]
ODRL Version 2.1 Common Vocabulary | ODRL Community Group
Semantics
https://www.w3.org/community/odrl/vocab/2.1/?rev=342
44/1438042988399.65_20150728002308-00060-ip-10-236-191-2_951826955_2.json
f01d46c9_abulary___ODRL_Community_Group_tity_Type_of_the_Policy_Entity_Semantics
[Identifier] Set [Comment] The Set is aimed at scenarios where there is an open criteria for the semantics of the policy expressions and typically refined by other systems/profiles that process the information at a later time. No privileges are granted to any Party. [Semantics]
Policy expressions that consists of entities from the complete model
[]
ODRL Version 2.1 Common Vocabulary | ODRL Community Group
Semantics
https://www.w3.org/community/odrl/vocab/2.1/?rev=342
44/1438042988399.65_20150728002308-00060-ip-10-236-191-2_951826955_2.json
f01d46c9_abulary___ODRL_Community_Group_tity_Type_of_the_Policy_Entity_Semantics
[Identifier] Ticket [Comment] May contain the Party entity with Assigner role and the Party entity with Assignee role. A Ticket (or Voucher) may be anonymous or personalised, where the holder of that Ticket may remain unknown or has to be identified. The holder, or if known, the Assignee, is being granted the terms of the Ticket from the Assigner (in known). [Semantics]
Policy expressions that stipulate the terms of usage and is redeemable by any Party who currently holds the Ticket in their possession
[]
ODRL Version 2.1 Common Vocabulary | ODRL Community Group
Semantics
https://www.w3.org/community/odrl/vocab/2.1/?rev=342
44/1438042988399.65_20150728002308-00060-ip-10-236-191-2_951826955_2.json
b8933e1e_Canonical_XML_Version_2_0__Values
[Name] ExclusiveMode [Description] whether to do inclusive or exclusive dealing of namespaces. In exclusive mode the InclusiveNamespaces parameter can be specified listing the prefixes that are to be treated in an inclusive mode [Default] false [Values]
true or false
[]
Canonical XML Version 2.0
Values
http://www.w3.org/TR/2010/WD-xml-c14n2-20100831/
44/1438042981525.10_20150728002301-00303-ip-10-236-191-2_816739540_0.json
b8933e1e_Canonical_XML_Version_2_0__Values
[Name] InclusiveNamespace [Description] list of prefixes to be treated inclusively. Special token #default indicates the default namespace. [Default] empty [Values]
space separated list of prefixes
[]
Canonical XML Version 2.0
Values
http://www.w3.org/TR/2010/WD-xml-c14n2-20100831/
44/1438042981525.10_20150728002301-00303-ip-10-236-191-2_816739540_0.json
b8933e1e_Canonical_XML_Version_2_0__Values
[Name] IgnoreComments [Description] whether to ignore comments during canonicalization [Default] true [Values]
true or false
[]
Canonical XML Version 2.0
Values
http://www.w3.org/TR/2010/WD-xml-c14n2-20100831/
44/1438042981525.10_20150728002301-00303-ip-10-236-191-2_816739540_0.json
b8933e1e_Canonical_XML_Version_2_0__Values
[Name] TrimTextNodes [Description] whether to trim (i.e. remove leading and trailing whitespaces) all text nodes when canonicalizing. Adjacent text nodes must be coalesced prior to trimming. If an element has an xml:space="preserve" attribute, then text node descendants of that element are not trimmed regardless of the value of this parameter. [Default] false [Values]
true or false
[]
Canonical XML Version 2.0
Values
http://www.w3.org/TR/2010/WD-xml-c14n2-20100831/
44/1438042981525.10_20150728002301-00303-ip-10-236-191-2_816739540_0.json
b8933e1e_Canonical_XML_Version_2_0__Values
[Name] Serialization [Description] whether to do the normal XML serialization (http://www.w3.org/2010/xml-c14n2#serializeXML), or do an EXI serialization (http://www.w3.org/2010/xml-c14n2#serializeEXI) - which is useful if the original document to be canonicalized is already in EXI format. [Default] serializeXML [Values]
serializeXML or serializeEXI
[]
Canonical XML Version 2.0
Values
http://www.w3.org/TR/2010/WD-xml-c14n2-20100831/
44/1438042981525.10_20150728002301-00303-ip-10-236-191-2_816739540_0.json
b8933e1e_Canonical_XML_Version_2_0__Values
[Name] PrefixRewrite [Description] with none, prefixes are not changed, with sequential prefixes are changed to n1, n2, n3 ... and with derived, each prefix is changed to nSuffix, where the suffix is derived by doing a digest of the namespace URI. [Default] none [Values]
none, sequential, derived
[]
Canonical XML Version 2.0
Values
http://www.w3.org/TR/2010/WD-xml-c14n2-20100831/
44/1438042981525.10_20150728002301-00303-ip-10-236-191-2_816739540_0.json
b8933e1e_Canonical_XML_Version_2_0__Values
[Name] SortAttributes [Description] whether the attributes need to be sorted before canonicalization. In some environments the order of attributes changes in transit so sorting is important. [Default] true [Values]
true or false
[]
Canonical XML Version 2.0
Values
http://www.w3.org/TR/2010/WD-xml-c14n2-20100831/
44/1438042981525.10_20150728002301-00303-ip-10-236-191-2_816739540_0.json
b8933e1e_Canonical_XML_Version_2_0__Values
[Name] XmlAncestors [Description] where to inherit the simple inheritable attributes (xml:lang and xml:space) and combine the xml:base i.e. similar to Canonical XML 1.1 or to completely ignore xml attributes in ancestors similar to Exclusive Canonical XML 1.0 [Default] inherit [Values]
inherit, none
[]
Canonical XML Version 2.0
Values
http://www.w3.org/TR/2010/WD-xml-c14n2-20100831/
44/1438042981525.10_20150728002301-00303-ip-10-236-191-2_816739540_0.json
b8933e1e_Canonical_XML_Version_2_0__Values
[Name] QNameAware [Description] set of nodes whose entire content must be processed as QName-valued or [CURIE]-valued for the purposes of canonicalization, including prefix rewriting and recognition of prefix "visible utilization" [Default] empty set [Values]
an enumeration of qualified element names, qualified attribute names, and unqualified attribute names (identified by name, and parent qualified name)
[]
Canonical XML Version 2.0
Values
http://www.w3.org/TR/2010/WD-xml-c14n2-20100831/
44/1438042981525.10_20150728002301-00303-ip-10-236-191-2_816739540_0.json
ebee36fd_Canonical_XML_Version_2_0__Default
[Name] ExclusiveMode [Values] true or false [Description] whether to do inclusive or exclusive dealing of namespaces. In exclusive mode the InclusiveNamespaces parameter can be specified listing the prefixes that are to be treated in an inclusive mode [Default]
false
[ [ "f", "a", "l", "s", "e" ], [ "e", "m", "p", "t", "y" ], [ "t", "r", "u", "e" ], [ "s", "e", "r", "i", "a", "l", "i", "z", "e", "X", "M", "L" ], [ "n", "o", "n", "e" ], [ "i", "n", "h", "e", "r", "i", "t" ], [ "e", "m", "p", "t", "y", " ", "s", "e", "t" ] ]
Canonical XML Version 2.0
Default
http://www.w3.org/TR/2010/WD-xml-c14n2-20100831/
44/1438042981525.10_20150728002301-00303-ip-10-236-191-2_816739540_0.json
ebee36fd_Canonical_XML_Version_2_0__Default
[Name] InclusiveNamespace [Values] space separated list of prefixes [Description] list of prefixes to be treated inclusively. Special token #default indicates the default namespace. [Default]
empty
[ [ "f", "a", "l", "s", "e" ], [ "e", "m", "p", "t", "y" ], [ "t", "r", "u", "e" ], [ "s", "e", "r", "i", "a", "l", "i", "z", "e", "X", "M", "L" ], [ "n", "o", "n", "e" ], [ "i", "n", "h", "e", "r", "i", "t" ], [ "e", "m", "p", "t", "y", " ", "s", "e", "t" ] ]
Canonical XML Version 2.0
Default
http://www.w3.org/TR/2010/WD-xml-c14n2-20100831/
44/1438042981525.10_20150728002301-00303-ip-10-236-191-2_816739540_0.json
ebee36fd_Canonical_XML_Version_2_0__Default
[Name] IgnoreComments [Values] true or false [Description] whether to ignore comments during canonicalization [Default]
true
[ [ "f", "a", "l", "s", "e" ], [ "e", "m", "p", "t", "y" ], [ "t", "r", "u", "e" ], [ "s", "e", "r", "i", "a", "l", "i", "z", "e", "X", "M", "L" ], [ "n", "o", "n", "e" ], [ "i", "n", "h", "e", "r", "i", "t" ], [ "e", "m", "p", "t", "y", " ", "s", "e", "t" ] ]
Canonical XML Version 2.0
Default
http://www.w3.org/TR/2010/WD-xml-c14n2-20100831/
44/1438042981525.10_20150728002301-00303-ip-10-236-191-2_816739540_0.json
ebee36fd_Canonical_XML_Version_2_0__Default
[Name] TrimTextNodes [Values] true or false [Description] whether to trim (i.e. remove leading and trailing whitespaces) all text nodes when canonicalizing. Adjacent text nodes must be coalesced prior to trimming. If an element has an xml:space="preserve" attribute, then text node descendants of that element are not trimmed regardless of the value of this parameter. [Default]
false
[ [ "f", "a", "l", "s", "e" ], [ "e", "m", "p", "t", "y" ], [ "t", "r", "u", "e" ], [ "s", "e", "r", "i", "a", "l", "i", "z", "e", "X", "M", "L" ], [ "n", "o", "n", "e" ], [ "i", "n", "h", "e", "r", "i", "t" ], [ "e", "m", "p", "t", "y", " ", "s", "e", "t" ] ]
Canonical XML Version 2.0
Default
http://www.w3.org/TR/2010/WD-xml-c14n2-20100831/
44/1438042981525.10_20150728002301-00303-ip-10-236-191-2_816739540_0.json
ebee36fd_Canonical_XML_Version_2_0__Default
[Name] Serialization [Values] serializeXML or serializeEXI [Description] whether to do the normal XML serialization (http://www.w3.org/2010/xml-c14n2#serializeXML), or do an EXI serialization (http://www.w3.org/2010/xml-c14n2#serializeEXI) - which is useful if the original document to be canonicalized is already in EXI format. [Default]
serializeXML
[ [ "f", "a", "l", "s", "e" ], [ "e", "m", "p", "t", "y" ], [ "t", "r", "u", "e" ], [ "s", "e", "r", "i", "a", "l", "i", "z", "e", "X", "M", "L" ], [ "n", "o", "n", "e" ], [ "i", "n", "h", "e", "r", "i", "t" ], [ "e", "m", "p", "t", "y", " ", "s", "e", "t" ] ]
Canonical XML Version 2.0
Default
http://www.w3.org/TR/2010/WD-xml-c14n2-20100831/
44/1438042981525.10_20150728002301-00303-ip-10-236-191-2_816739540_0.json
ebee36fd_Canonical_XML_Version_2_0__Default
[Name] PrefixRewrite [Values] none, sequential, derived [Description] with none, prefixes are not changed, with sequential prefixes are changed to n1, n2, n3 ... and with derived, each prefix is changed to nSuffix, where the suffix is derived by doing a digest of the namespace URI. [Default]
none
[ [ "f", "a", "l", "s", "e" ], [ "e", "m", "p", "t", "y" ], [ "t", "r", "u", "e" ], [ "s", "e", "r", "i", "a", "l", "i", "z", "e", "X", "M", "L" ], [ "n", "o", "n", "e" ], [ "i", "n", "h", "e", "r", "i", "t" ], [ "e", "m", "p", "t", "y", " ", "s", "e", "t" ] ]
Canonical XML Version 2.0
Default
http://www.w3.org/TR/2010/WD-xml-c14n2-20100831/
44/1438042981525.10_20150728002301-00303-ip-10-236-191-2_816739540_0.json
ebee36fd_Canonical_XML_Version_2_0__Default
[Name] SortAttributes [Values] true or false [Description] whether the attributes need to be sorted before canonicalization. In some environments the order of attributes changes in transit so sorting is important. [Default]
true
[ [ "f", "a", "l", "s", "e" ], [ "e", "m", "p", "t", "y" ], [ "t", "r", "u", "e" ], [ "s", "e", "r", "i", "a", "l", "i", "z", "e", "X", "M", "L" ], [ "n", "o", "n", "e" ], [ "i", "n", "h", "e", "r", "i", "t" ], [ "e", "m", "p", "t", "y", " ", "s", "e", "t" ] ]
Canonical XML Version 2.0
Default
http://www.w3.org/TR/2010/WD-xml-c14n2-20100831/
44/1438042981525.10_20150728002301-00303-ip-10-236-191-2_816739540_0.json
ebee36fd_Canonical_XML_Version_2_0__Default
[Name] XmlAncestors [Values] inherit, none [Description] where to inherit the simple inheritable attributes (xml:lang and xml:space) and combine the xml:base i.e. similar to Canonical XML 1.1 or to completely ignore xml attributes in ancestors similar to Exclusive Canonical XML 1.0 [Default]
inherit
[ [ "f", "a", "l", "s", "e" ], [ "e", "m", "p", "t", "y" ], [ "t", "r", "u", "e" ], [ "s", "e", "r", "i", "a", "l", "i", "z", "e", "X", "M", "L" ], [ "n", "o", "n", "e" ], [ "i", "n", "h", "e", "r", "i", "t" ], [ "e", "m", "p", "t", "y", " ", "s", "e", "t" ] ]
Canonical XML Version 2.0
Default
http://www.w3.org/TR/2010/WD-xml-c14n2-20100831/
44/1438042981525.10_20150728002301-00303-ip-10-236-191-2_816739540_0.json
ebee36fd_Canonical_XML_Version_2_0__Default
[Name] QNameAware [Values] an enumeration of qualified element names, qualified attribute names, and unqualified attribute names (identified by name, and parent qualified name) [Description] set of nodes whose entire content must be processed as QName-valued or [CURIE]-valued for the purposes of canonicalization, including prefix rewriting and recognition of prefix "visible utilization" [Default]
empty set
[ [ "f", "a", "l", "s", "e" ], [ "e", "m", "p", "t", "y" ], [ "t", "r", "u", "e" ], [ "s", "e", "r", "i", "a", "l", "i", "z", "e", "X", "M", "L" ], [ "n", "o", "n", "e" ], [ "i", "n", "h", "e", "r", "i", "t" ], [ "e", "m", "p", "t", "y", " ", "s", "e", "t" ] ]
Canonical XML Version 2.0
Default
http://www.w3.org/TR/2010/WD-xml-c14n2-20100831/
44/1438042981525.10_20150728002301-00303-ip-10-236-191-2_816739540_0.json
2cce7aff_Animation___SVG_1_1___20021115___set_
[Additive?] yes ['animate'] yes ['animate Color'] no ['animate Transform'] no ['set']
yes
[ [ "y", "e", "s" ], [ "n", "o" ] ]
Animation - SVG 1.1 - 20021115
'set'
http://www.w3.org/TR/2002/PR-SVG11-20021115/animate.html
44/1438042990445.44_20150728002310-00200-ip-10-236-191-2_832780394_18.json
2cce7aff_Animation___SVG_1_1___20021115___set_
[Additive?] yes ['animate'] yes ['animate Color'] yes ['animate Transform'] no [Notes] Only RGB color values are additive. ['set']
yes
[ [ "y", "e", "s" ], [ "n", "o" ] ]
Animation - SVG 1.1 - 20021115
'set'
http://www.w3.org/TR/2002/PR-SVG11-20021115/animate.html
44/1438042990445.44_20150728002310-00200-ip-10-236-191-2_832780394_18.json
2cce7aff_Animation___SVG_1_1___20021115___set_
[Additive?] no ['animate'] no ['animate Color'] no ['animate Transform'] no ['set']
no
[ [ "y", "e", "s" ], [ "n", "o" ] ]
Animation - SVG 1.1 - 20021115
'set'
http://www.w3.org/TR/2002/PR-SVG11-20021115/animate.html
44/1438042990445.44_20150728002310-00200-ip-10-236-191-2_832780394_18.json
2cce7aff_Animation___SVG_1_1___20021115___set_
[Additive?] no ['animate'] yes ['animate Color'] no ['animate Transform'] no ['set']
yes
[ [ "y", "e", "s" ], [ "n", "o" ] ]
Animation - SVG 1.1 - 20021115
'set'
http://www.w3.org/TR/2002/PR-SVG11-20021115/animate.html
44/1438042990445.44_20150728002310-00200-ip-10-236-191-2_832780394_18.json
2cce7aff_Animation___SVG_1_1___20021115___set_
[Additive?] yes ['animate'] no ['animate Color'] no ['animate Transform'] yes [Notes] Additive means that a transformation is post-multiplied to the base set of transformations. ['set']
no
[ [ "y", "e", "s" ], [ "n", "o" ] ]
Animation - SVG 1.1 - 20021115
'set'
http://www.w3.org/TR/2002/PR-SVG11-20021115/animate.html
44/1438042990445.44_20150728002310-00200-ip-10-236-191-2_832780394_18.json
2cce7aff_Animation___SVG_1_1___20021115___set_
[Data type] All other data types used in animatable attributes and properties [Additive?] no ['animate'] yes ['animate Color'] no ['animate Transform'] no ['set']
yes
[ [ "y", "e", "s" ], [ "n", "o" ] ]
Animation - SVG 1.1 - 20021115
'set'
http://www.w3.org/TR/2002/PR-SVG11-20021115/animate.html
44/1438042990445.44_20150728002310-00200-ip-10-236-191-2_832780394_18.json
c30e29db_abulary___ODRL_Community_Group_name__of_the_entity_Constraint_Semantics
[Identifier] absolutePosition [Comment] For example, JPEG image must be positioned at 100×100 pixel location. This may be used to express [PLUS] semantics. [Semantics]
A point defined with absolute coordinates
[]
ODRL Version 2.1 Common Vocabulary | ODRL Community Group
Semantics
https://www.w3.org/community/odrl/vocab/2.1/?rev=332
44/1438042981525.10_20150728002301-00029-ip-10-236-191-2_944294924_5.json
c30e29db_abulary___ODRL_Community_Group_name__of_the_entity_Constraint_Semantics
[Identifier] absoluteSize [Comment] For example, JPEG image must be reproduced onto an area no larger than A0. This may be used to express [PLUS] semantics. [Semantics]
The absolute dimension that the Asset may be resized
[]
ODRL Version 2.1 Common Vocabulary | ODRL Community Group
Semantics
https://www.w3.org/community/odrl/vocab/2.1/?rev=332
44/1438042981525.10_20150728002301-00029-ip-10-236-191-2_944294924_5.json
c30e29db_abulary___ODRL_Community_Group_name__of_the_entity_Constraint_Semantics
[Identifier] count [Comment] Should be a positive integer. [Semantics]
The numeric count indicating the number of times the corresponding entity may be exercised
[]
ODRL Version 2.1 Common Vocabulary | ODRL Community Group
Semantics
https://www.w3.org/community/odrl/vocab/2.1/?rev=332
44/1438042981525.10_20150728002301-00029-ip-10-236-191-2_944294924_5.json
c30e29db_abulary___ODRL_Community_Group_name__of_the_entity_Constraint_Semantics
[Identifier] dateTime [Comment] Date and Time value must conform to [ISO-8601] as represented in [W3CXMLSCHEMA]. The use of Timezone information is strongly recommended. [Semantics]
The date (and optional time and timezone) representing a point in time or period
[]
ODRL Version 2.1 Common Vocabulary | ODRL Community Group
Semantics
https://www.w3.org/community/odrl/vocab/2.1/?rev=332
44/1438042981525.10_20150728002301-00029-ip-10-236-191-2_944294924_5.json
c30e29db_abulary___ODRL_Community_Group_name__of_the_entity_Constraint_Semantics
[Identifier] fileFormat [Comment] For example, this may be used to express [PLUS] semantics; only JPEG image may be distributed. [Semantics]
The file format applicable to the Asset
[]
ODRL Version 2.1 Common Vocabulary | ODRL Community Group
Semantics
https://www.w3.org/community/odrl/vocab/2.1/?rev=332
44/1438042981525.10_20150728002301-00029-ip-10-236-191-2_944294924_5.json
c30e29db_abulary___ODRL_Community_Group_name__of_the_entity_Constraint_Semantics
[Identifier] industry [Comment] For example, publishing, financial. [Semantics]
The defined industry sector applicable to the asset usage
[]
ODRL Version 2.1 Common Vocabulary | ODRL Community Group
Semantics
https://www.w3.org/community/odrl/vocab/2.1/?rev=332
44/1438042981525.10_20150728002301-00029-ip-10-236-191-2_944294924_5.json
c30e29db_abulary___ODRL_Community_Group_name__of_the_entity_Constraint_Semantics
[Identifier] language [Comment] For example, this may be used to express [PLUS] semantics; JPEG image may only be reproduced with Spanish text. Must use [BCP-47] codes. [Semantics]
The natural language applicable to the asset usage
[]
ODRL Version 2.1 Common Vocabulary | ODRL Community Group
Semantics
https://www.w3.org/community/odrl/vocab/2.1/?rev=332
44/1438042981525.10_20150728002301-00029-ip-10-236-191-2_944294924_5.json
c30e29db_abulary___ODRL_Community_Group_name__of_the_entity_Constraint_Semantics
[Identifier] deliveryChannel [Comment] For example, the asset may be distributed only on mobile networks. [Semantics]
The delivery channel used for storing or communicating the asset
[]
ODRL Version 2.1 Common Vocabulary | ODRL Community Group
Semantics
https://www.w3.org/community/odrl/vocab/2.1/?rev=332
44/1438042981525.10_20150728002301-00029-ip-10-236-191-2_944294924_5.json
c30e29db_abulary___ODRL_Community_Group_name__of_the_entity_Constraint_Semantics
[Identifier] elapsedTime [Comment] The start of the period is when the action is first exercised. [Semantics]
A period of time in which the policy action can be exercised.
[]
ODRL Version 2.1 Common Vocabulary | ODRL Community Group
Semantics
https://www.w3.org/community/odrl/vocab/2.1/?rev=332
44/1438042981525.10_20150728002301-00029-ip-10-236-191-2_944294924_5.json
c30e29db_abulary___ODRL_Community_Group_name__of_the_entity_Constraint_Semantics
[Identifier] event [Comment] For example, asset may be used at the “FIFA World Cup” only. To express events related to undertaking Duties, a specific event value has been defined: policyUsage – the time period whilst the policy is being exercised This will enable constraints to be expressed such as “event lt o:policyUsage” indicating before the policy is exercised. [Semantics]
Specification of a defined event applicable to the asset usage
[]
ODRL Version 2.1 Common Vocabulary | ODRL Community Group
Semantics
https://www.w3.org/community/odrl/vocab/2.1/?rev=332
44/1438042981525.10_20150728002301-00029-ip-10-236-191-2_944294924_5.json
c30e29db_abulary___ODRL_Community_Group_name__of_the_entity_Constraint_Semantics
[Identifier] media [Comment] For example, electronic, print, advertising, marketing. This may be used to express [PLUS] semantics. [Semantics]
The media type in which the asset may be used
[]
ODRL Version 2.1 Common Vocabulary | ODRL Community Group
Semantics
https://www.w3.org/community/odrl/vocab/2.1/?rev=332
44/1438042981525.10_20150728002301-00029-ip-10-236-191-2_944294924_5.json
c30e29db_abulary___ODRL_Community_Group_name__of_the_entity_Constraint_Semantics
[Identifier] meteredTime [Comment] Value must conform to [ISO-8601] as represented in [W3CXMLSCHEMA]. For example “P30H” indicates a 30 hour period. [Semantics]
The maximum period of metered usage time
[]
ODRL Version 2.1 Common Vocabulary | ODRL Community Group
Semantics
https://www.w3.org/community/odrl/vocab/2.1/?rev=332
44/1438042981525.10_20150728002301-00029-ip-10-236-191-2_944294924_5.json
c30e29db_abulary___ODRL_Community_Group_name__of_the_entity_Constraint_Semantics
[Identifier] payAmount [Comment] The dataType attribute may be used to indicate the type of the value (eg decimal) and the unit attribute to indicate the currency. May be used for compensation duties. [Semantics]
The value of the financial payment
[]
ODRL Version 2.1 Common Vocabulary | ODRL Community Group
Semantics
https://www.w3.org/community/odrl/vocab/2.1/?rev=332
44/1438042981525.10_20150728002301-00029-ip-10-236-191-2_944294924_5.json
c30e29db_abulary___ODRL_Community_Group_name__of_the_entity_Constraint_Semantics
[Identifier] percentage [Comment] A numeric value from 0 to 100. For example, extract a maximum of 50% of the asset [Semantics]
The amount (as a percentage) of the action applicable to the asset
[]
ODRL Version 2.1 Common Vocabulary | ODRL Community Group
Semantics
https://www.w3.org/community/odrl/vocab/2.1/?rev=332
44/1438042981525.10_20150728002301-00029-ip-10-236-191-2_944294924_5.json
c30e29db_abulary___ODRL_Community_Group_name__of_the_entity_Constraint_Semantics
[Identifier] product [Comment] For example, this may be used to express [PLUS] semantics; images may only be reproduced in the XYZ Magazine. [Semantics]
The specified Product or Service name
[]
ODRL Version 2.1 Common Vocabulary | ODRL Community Group
Semantics
https://www.w3.org/community/odrl/vocab/2.1/?rev=332
44/1438042981525.10_20150728002301-00029-ip-10-236-191-2_944294924_5.json
c30e29db_abulary___ODRL_Community_Group_name__of_the_entity_Constraint_Semantics
[Identifier] purpose [Comment] For example, educational use. [P3P] Purpose values may also be used. [Semantics]
Specification of a defined purpose applicable to the asset usage
[]
ODRL Version 2.1 Common Vocabulary | ODRL Community Group
Semantics
https://www.w3.org/community/odrl/vocab/2.1/?rev=332
44/1438042981525.10_20150728002301-00029-ip-10-236-191-2_944294924_5.json